Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Exam (elaborations) Operational Security Midterm Exam Solved. (EMSISSISOL631)

Rating
-
Sold
-
Pages
23
Grade
A+
Uploaded on
31-07-2022
Written in
2020/2021

Exam (elaborations) Operational Security Midterm Exam Solved. (EMSISSISOL631) QUESTION 1 1. When trying to achieve operational consistency, which of following oversight phases performs the function of periodically assessing to ensure desired results are achieved? impro ve meas ure review mana ge QUESTION 2 1. In order to be thoughtful about the implementation of security policies and controls, leaders must balance the need to reduce with the impact to the business operations. Doing so could mean phasing security controls in over time or be as simple as aligning security implementation with the business’s training events. Costs productiv ity Risk data storage QUESTION 3 1. The domain ensures risks are diminished and remediated in the most cost-effective manner. To prevent risk from increasing in severity and scope, this domain coordinates risk responses ensuring that the right people are engaged when appropriate. risk response risk governance risk evaluation risk acceptance QUESTION 4 1. If a CISO seeks to raise employees’ awareness of the dangers of malware in the organization, which of the following approaches is recommended? The CISO should distribute a written explanation of the dangers of malware to each employee. The CISO should arrange for an IT expert on malware to give a presentation to employees. The CISO should explain the technical way in which malware can infect a machine. The CISO should talk about how malware could prevent the service desk from helping a customer. QUESTION 5 1. Of the many factors one must consider to ensure security policies and controls align with regulations; is/are important to demonstrate coverage of regulatory requirements because they show the importance of each security control. Evidence Inventories security control mappings business requirements QUESTION 6 1. Using switches, routers, internal firewalls, and other devices, you can restrict network traffic with a , which limits what and how computers are able to talk to each other. demilitarized zone flat network Sniffer segmented network QUESTION 7 1. Authentication of a workstation and encryption of wireless traffic are issues that belong to which of the following two domains? LAN and WAN workstation and LAN LAN-WAN and remote

Show more Read less
Institution
Course

Content preview

Operational Security Midterm Exam Solved.


QUESTION 1
1. When trying to achieve operational consistency, which
of following oversight phases performs the function of
periodically assessing to ensure desired results are
achieved?
impro
ve
meas
ure
review
mana
ge
2.50000
QUESTION 2 points
1. In order to be thoughtful about the implementation of
security policies and controls, leaders must balance the need
to reduce with
the impact to the business operations. Doing so could mean
phasing security controls in over time or be as simple as
aligning security implementation with the business’s training
events.
Costs

producti
v ity
Risk
data
storage
2.50000
QUESTION 3 points
1. The domain ensures risks are
diminished and remediated in the most cost-effective
manner. To prevent risk from increasing in severity and
scope, this domain coordinates risk responses ensuring
that the right people are engaged when appropriate.
risk
response
risk
governanc
e
risk
evaluati
on
risk

,Operational Security Midterm Exam Solved.


acceptanc
e
2.50000
QUESTION 4 points

, Operational Security Midterm Exam Solved.


1. If a CISO seeks to raise employees’ awareness of
the dangers of malware in the organization, which of
the following approaches is recommended?
The CISO should distribute a written explanation of the
dangers of malware to each employee.
The CISO should arrange for an IT expert on malware to give
a presentation to employees.
The CISO should explain the technical way in which
malware can infect a machine.
The CISO should talk about how malware could prevent the
service desk from helping a customer.
2.50000
QUESTION 5 points
1. Of the many factors one must consider to ensure
security policies and controls align with regulations; is/are
important to demonstrate coverage of regulatory
requirements because they show the importance of each
security control.


Evidence
Inventories
security control
mappings
business
requiremen
ts
2.50000
QUESTION 6 points
1. Using switches, routers, internal firewalls, and other
devices, you can restrict network traffic with a , which
limits what and how computers are able to talk to each other.

demilitariz
ed zone
flat
network
Sniffer

segment
ed
network
2.50000
QUESTION 7 points

Written for

Institution
Course

Document information

Uploaded on
July 31, 2022
Number of pages
23
Written in
2020/2021
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$9.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
frackasaura Wayne State University
Follow You need to be logged in order to follow users or courses
Sold
66
Member since
4 year
Number of followers
53
Documents
673
Last sold
4 months ago
Achievers

Hello mate, I understand how frustrating it can be to read for that subject. Let\'s work together and ease the burden for you with Tests an solutions in Nursing, Law Pharmacy, Chemistry, Biology and other major subjects.

3.8

16 reviews

5
10
4
1
3
1
2
0
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions